The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

Hackers in Hollywood
Ever since the mid-1990s, when the Internet started to grow fast, screenwriters have been authoring stories about computer hackers. After all, they provide one of the essential characteristics of any story, conflict. In movies and television, hackers are almost exclusively portrayed by young, anti-social people; and, are typically seeking revenge for some perceived slight brought on them or their family by some type of corporate entity.

If they don’t fit that paradigm, then they are typically dystopian science fiction movies/shows where they are hacking to save humanity from nefarious machines, subversive human groups, or aliens. This, of course, is in contrast to the way that we look at hackers; and, while there are a fair amount of “white hat” hackers that work for the “good guys” to expose vulnerabilities for organizations to help keep them safe, most hackers are simply trying to get over on the people and organizations they target.

Differences Between Reality and Perception
One of the major differences in perception is in what a hacker does. In the media, the hacker is portrayed as sitting at a high-powered laptop that they keep in their jacket, typing 80 words per minute without a mistake, cracking system encryption like he/she was sending an email.

This is your average hacker screen from a movie or tv show:

Of course, this is completely ridiculous. In reality, a video of a hacker sending an email would be more apt. A real hacker’s screen is one with function. There are command prompts and open windows with real applications that help them diagnose possible vulnerabilities. Today’s hackers' screens most likely look a lot like your screen, with browsers open, a word processing app to create content, and maybe a graphics problem for the hacker with ingenuity.

The act of actually hacking into an organization's network requires more research than typing-pool skills. In fact, for today’s hacker, the computer and applications they use is as much of the story as is the timing. It’s simply not cinematically pleasing to sit around and watch people type, so they come up with all types of ludicrous graphics to represent the network's security they are trying to work around.

People need to know how to protect themselves against hackers, and BNMC’s IT experts can help. Call us today at 978-482-2020 to get started learning how to protect yourself against today’s most powerful hacks.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, May 21 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Computing User Tips Business Network Security Malware Hackers Computer Microsoft Google Software Productivity Tech Term Hosted Solutions Internet Communication IT Services Efficiency Data Mobile Devices Ransomware Small Business IT Support Hardware Smartphone Workplace Tips Backup Innovation Android Data Recovery Saving Money Business Continuity Managed IT Services Cloud Computing Users Mobile Device Data Management Social Media Managed IT Services Windows 10 Browser Windows Data Backup Internet of Things Microsoft Office Cybersecurity App Windows 10 Business Management Office 365 Passwords Productivity Outsourced IT Word Vulnerability Server Facebook Phishing Upgrade communications Artificial Intelligence Gmail Disaster Recovery Information Network Encryption Smartphones Chrome Remote Monitoring Miscellaneous Save Money Analytics Website Managed Service Infrastructure Virtual Reality Tip of the week Money VoIP IT Support BYOD Applications Gadgets Managed Service Provider Employer-Employee Relationship Google Drive Access Control Content Filtering IT Management Bandwidth YouTube Paperless Office Company Culture Robot Employee-Employer Relationship Apple Risk Management Education Automation Office Tips Hacker Data storage Big Data Government Maintenance Antivirus Settings Display Router Administration Business Intelligence VPN Mouse Data Security Hard Disk Drive Server Management Monitors Apps Business Technology Vendor Management Virtual Private Network Touchscreen Chromebook Quick Tips Augmented Reality Tablet Storage Data loss Printing Managing Stress Unified Threat Management End of Support Telephone Systems Laptop Development desktop Two-factor Authentication The Internet of Things Firewall Avoiding Downtime SaaS HIPAA Scam Computers Document Management Virtualization Spam Computing Downtime Holiday Outlook WiFi Operating System Mobile Security Retail Wireless Alert LiFi Networking Solid State Drive Hosted Solution Current Events Troubleshooting Compliance Dark Web Best Practice iOS Hotspot Internet Exlporer Network Management Customer Service Training Corporate Profile Spying IT Technicians Optimization Halloween Automobile Office Cyber Monday Samsung Security Cameras Connectivity G Suite Leominster Legislation Human Error Modem FinTech Dell Tech Support Cryptocurrency Analysis Students Staff WannaCry IT solutions Going Green Regulations Microsoft Excel Cabling Google Docs Scalability Language Value SharePoint Mirgation Recycling Scary Stories Managed IT Social Engineering Smart Technology Google Maps Managed Services IoT Techology Hacks K-12 Schools Running Cable Statistics Google Wallet Device Cookies MSP How To Lenovo Websites Bitcoin Mixed Reality LED Social Networking Buisness Mail Merge Blockchain Business Growth Migration Computing Infrastructure Professional Services Downloads Password PowerPoint Chatbots eWaste Sports Shortcut Safety Distributed Denial of Service Legal Laptops Star Wars Virtual Desktop VoIP Unified Threat Management Wearable Technology Network upgrade Bluetooth Comparison Digital Payment Remote Computing Unified Communications Drones Mobility Nanotechnology Firefox Superfish Windows 8 Data Breach Network Congestion Digital Co-Managed IT Motherboard Cables Address Permissions Disaster Alerts USB Mobile Device Management Onboarding Identity Continuity Patch Management Collaboration Managed IT Service Deep Learning Software as a Service Fraud Cost Management User Error Hard Disk Drives Smart Office Writing Specifications Print Toner Screen Reader Charging Customer Relationship Management Wi-Fi Slack Heating/Cooling Multi-Factor Security Spyware Content Wires Uninterrupted Power Supply Alt Codes Messaging Licensing Dongle Cybercrime Digital Signage Solar Marketing File Sharing Break Fix Bring Your Own Device Entertainment Assessment Time Management Dark Data Printer Computer Care Update IBM Monitoring Solid State Drives Work Search Black Friday Budget Shortcuts Smart Tech Social Servers Google Calendar Identity Theft Information Technology Streaming Voice over Internet Protocol Emergency Politics Typing Humor Employee-Employer Relationships Cooperation Service Level Agreement Travel How To Work/Life Balance Recovery Health Private Cloud Supercomputer Black Market CrashOverride Printers Motion Sickness Law Enforcement Staffing Administrator Notifications Taxes Electronic Medical Records IT Budget Twitter Web Server Physical Security what was your? GPS Emoji Upgrades Gadget Crowdsourcing IT Consultant Cameras Personal Information Botnet Tracking Cortana Meetings 3D Printing Windows 7 Cleaning Processors CCTV Machine Learning BDR Webcam Unsupported Software Mobile Computing Error Regulation Computer Repair Relocation Point of Sale Mobile Data Ben McDonald shares

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3